Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Gamifying cultural experiences across the urban environment., , , , , , and . Multim. Tools Appl., 78 (3): 3341-3364 (2019)Ranflood: A mitigation tool based on the principles of data flooding against ransomware., , , , and . SoftwareX, (February 2024)Microservice security: a systematic literature review., , , , , and . PeerJ Comput. Sci., (2022)Metrics for Cyber-Physical Security: a call to action., , , , , and . ISNCC, page 1-4. IEEE, (2022)Poster: Continual Network Learning., , , , , and . SIGCOMM, page 1096-1098. ACM, (2023)P4DM: Measure the Link Delay with P4., , , , and . Sensors, 22 (12): 4411 (2022)Towards the Creation of Interdisciplinary Consumer-Oriented Security Metrics., , , , , and . CCNC, page 957-958. IEEE, (2023)On the Trade-Off Between Privacy and Information Quality in Location Based Services., , , , and . CCNC, page 994-997. IEEE, (2024)Federated Platooning: Insider Threats and Mitigations., , , , and . HICSS, page 1-10. ScholarSpace, (2019)TechNETium: Atomic Predicates and Model Driven Development to Verify Security Network Policies., , , and . CCNC, page 1-6. IEEE, (2020)